Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
Arab Academy for Science Technology and Maritime Transport Cairo, Egypt
College of Engineering and Technology Electronics and Communications Engineering Department
Digital Image Watermarking Protection Based on Chaotic Biometric System
A Thesis by
Eng. Ahmed Eisayed Ahmed Zein Eldin
Submitted in Partial Fulfillment of the Requirementsfor the Degree of
Master of Science
In Communications Engineering
Supervised by:
Prof. Mohammed Waleed Fakhr Dean of Faculty of Computer Science & IT,
Arab Academy for Science, Technology and Maritime Transport (AASTMT)
Dr. Mohammed Saad EI-MahaUawy Electronics and Communication Department,
Faculty of Engineering, Arab Academy for Science, Technology and
Maritime Transport (AASTMT)
Cairo
Dr. Esam AbdEI-Magid Hagras Electronics and Communication
Department
2011
Technical Researches Center Armed Forces
'.~~ ,,~ ~~ ~~t
'4"~\'f~ Arab Academy for Science Technology and Maritime Transport
Cairo, Egypt
College of Engineering and Technology Electronics and Communications Engineering Department
Digital Image Watermarking Protection Based on Chaotic Biometric System
A Thesis by
Eng. Ahmed Eisayed Ahmed Zein Eldin
Submitted in Partial Fulfillment of the Requirements for the Degree of
Master of Science
In Communications Engineering
Prof. Mohamed Waleed Fakhr Dr. Mohamed Saad EIMahallawy Dr. Esam AbdEI-Magid Hagras
Supervisor Supervisor Supervisor
Prof. Fatma EI-Zahraa Abou-Chadi Associate Prof. Mohamed Esam Khedr
Examiner Examiner
NOVEMBER 2011
ABSTRACT The growth of high speed computer networks and that of Internet, in particular, has
explored means of new business, scientific, entertainment, and social opportunities.
Ironically, the cause for the growth is also of the apprehension use of digital formatted
data. Digital media offer several distinct advantages over analog media, such as high
quality, easy editing, high fidelity copying. The ease by which digital information can be
duplicated and distributed has led to the need for effective copyright protection tools.
Various software products have been recently introduced in attempt to address these
growing concerns. Digital Watermarking is the process that embeds data called a
watermark into a multimedia object such that watermark can be detected or extracted later
to make an assertion about the object.
In this thesis, three different contributions were suggested, firstly, a Partial image
Encryption algorithm based on Multi-Level two dimension Discrete Wavelet Transform
and Multi-Map Orbit Hopping Chaotic Encryption (ML 2D-DWT-MMOH-CPE) has been
proposed, secondly, a new commutative watermarking and partial encryption (CWPE)
algorithm based on DWT Spread Spectrum watermarking and Partial Encryption algorithm
using single level two Dimension Discrete Wavelet Transform and Multi-Map Orbit
Hopping Chaotic Encryption (IL 2D-DWT-MMOH-CPE ) and, [mally, a new
Commutative Watermarking and Partial Encryption algorithm based on one level two
dimension wavelet and discrete cosine transform domain (lL 2D-DWT-DCn and Multi
Map Orbit Hopping Chaotic Encryption (MMOH-CPE).
DWT characteristics provide spatial\frequency localization and multi resolution
sub-band. CDMA SS improves security, anti interference and low probability of intercept.
Chaos based encryption techniques which is considered suitable for practical use as these
techniques provide combination of speed, high security, complexity, reasonable
computational overheads and computational power.
For the proposed algorithm (CWPE) (IL 2D-DWT-MMOH-CPE), performance
evaluation reflects some weakness against some sever attacks (50% Resizing, Median
Filtering, 10% JPEG Compression). To overcome the previous mentioned weakness, a
Commutative Hybrid Frequency Domain Watermarking and Chaotic Partial Encryption
algorithm is proposed (CWPE) (IL 2D-DWT-DCT-MMOH-CPE), which is based on the
fact; combined two transforms could compensate for the drawbacks of each other;
resulting in effective watermarking, based on characteristics of embedding locations.
I
Acknowledgement This thesis with all its final results would have never been achieved without
ALLAH's will, and I am so grateful Allah for giving me the ability and strength to
complete its final phases. I would also like to express my thanks for my parents, brother,
wife, daughter, professors and tutors who were always supporting me and never hesitated a
second to give me as much as they can from their knowledge, care, time and efforts.
I express my many thanks and all grateful feeling to my supervisors Prof.
Mohmmmed Waleed Fakhr, Dr. Mohammed S. EI-Mahallawy and Dr. Esam A.
Hagras for their guidance and support throughout the research to achieve all of the gained
results, also, for all times we spent working together in the thesis and for benefiting from
them in many fields of life.
I would also like to express my thanks to the Arab Academy for Science and
Technology and Maritime Transport and the National Telecommunication Institute for all
the facilities that were available, and for the provided environment during my studies and
research.
Finally I would like to express my thanks to my colleagues and to everyone who helped
me to complete this research.
II
TABLE OF CONTENTS
Page
List Of Figures ............ '" ...... ......... ... ........... .... ....... ..... ...... ..... .... ... ....... III List Of Tables ................................................................................... '" VIn List Of Symbols................................................................. ....................... XIII List Of Abbreviations... .......................................................................... XVI
CHAPTER 1:
Introduction
1.1 Aims and Objectives............................................................ .................... 1 1.2 Methodology... ............................................................... ................... 2 1.3 Thesis Outline ................................................................................... 3
CHAPTER 2:
Multimedia Protection Overview
2.1 Introduction....................................... .................................................... 4 2.2 Multimedia content encryption............... ................................................. 5 2.3 Encryption techniques...................................................... .................... 6
2.3.1 Private-Key Encryption............................................................. 6 2.3.2 Public-Key Cryptography............ ..................... ......................... 6
2.4 Digital Multimedia Watermarking............................................................ 7 2.4.1 Watermarking System Instruction......... ......... ..................... ........... 10 2.4.2 Watermarking Classification.................................................. ...... 11
2.4.2.1 Watermarking Visibility................................................. 11 2.4.2.2 Watermarking Robustness... ...... ...................................... 13 2.4.2.3 Watermarking Embedding Domain................................ .... 17 2.4.2.4 Watermarking Extraction.............. ..................... ..... ..... .... 28
2.5 Watermarking Issues... ......................................................................... 29 2.5.1 Capacity Issue (Bit Rate)............... .............................................. 29 2.5.2 Robustness.............................................................. ..... ........... 29 2.5.3Transparency (Invisibility).............................. ...... ........ .... ............ 30
2.5.3.1 Perceptual Invisibility...................................... ...... ..... .... 30 2.5.3.2 Statistical Invisibility....................................... ............... 30
2.5.4 Security ........................ '" ......... ...... ......... ......... ... ................. 30 2.6 Watermarking Applications............... ........................................... ..... ..... 31
IV
CHAPTER 3:
Multi-LeveI2D-DWT Image Encryption Based on Multi-Map Orbit Hopping
Chaotic Partial Encryption
3.1 Introduction ........................ '" ............... ... ...... ... ......... ..................... 33 3.2 Chaos and Cryptography..................... .......................................... ....... 34
3.2.1 Characteristics of Chaos ........................... '" . ..... ......... ......... ..... 35 3.2.2 Relationship between Chaos and Cryptography.............................. 36 3.2.3 Chaotic Map-Based Encryption................................................. 38
3.2.3.1 I-D Chaotic Map (Logistic map).. .... ...... ...... ... ................. 38 3.2.3.2 2D Cat Chaotic Mapping (Anto Id Map) ... '" . '" .. ................ 41
3.2.4 Cryptographic Hash Functions............... ................................... 42 3.3 Related Multimedia Partial Encryption Schemes........................................ 43 3.4 Proposed Image Encryption based on Multi-LeveI2D-DWT and
MMOH-CPE................................. ................................................. 49 3.4.1 Secure Key Management(SKM) Subsystem................................. 50
3.4.1.1 Chaotic Scrambling Generator Subsystem......................... 51 3.4.1.2 Proposed MMOH-CPE............................................... 51
3.5 Simulation Results for the proposed algorithm.......................................... 53 3.5.1 Security Analysis... ..................... .......................................... 53
3.5.1.1Visual Testing........................................................... 53 3.5.1.2 Statistical Analysis........................ ............................. 53 3.5.1.3 Differential Analysis................................................... 54 3.5.1.4 Key Sensitivity Test...................................... ... ...... ..... 55
3.6 Summary ..................... '" ............................. , ...... ...... ..................... 64
CHAPTER 4:
Secure Biometric DWT Watermarking Based on Multi Map Orbit Bopping
Chaotic Partial Encryption
4.1 Introduction.............................................................................. ...... 66 4.2 Related DWT watermarking and Chaotic Encryption .................................. , 66 4.3 Commutative Watermarking and Encryption............................................. 71 4.4 Proposed Commutative Biometric Watermarking and Chaotic Partial
Encryption Based on MMOH-CPE...................................................... ... 77 4.4.1 Biometric Key Generation..................... ......... ......................... 78 4.4.2 Fingerprint Image Preprocessing Stages....................................... 81
4.4.2.1 Fingerprint Image Normalization....................... ............... 82 4.4.2.2 Orientation Estimation............................................ .... 83
v
4.4.2.3 Fingerprint Image Enhancement..................................... 83 4.4.2.4 Fingerprint Image Binarization................................... .... 85 4.4.2.5 Fingerprint Image Thinning.......................................... 86 4.4.2.6 Fingerprint Image Segmentation..................................... 86
4.4.3 Fingerprint Image Post-processing Stages..................................... 87 4.4.3.1 Minutiae extraction and Filtering....................... .............. 87
4.5 General Architecture of the Proposed Algorithm......................................... 91 4.5.1 Pre-processing Stage..................... ........................................ 91
4.5.1.1 Chaotic Scrambling Parameter Generator Subsystem... ......... 92 4.5.1.2 Multi-Map Orbit Hopping Chaotic Subsystem.................. ... 93
4.5.2 Processing Stage........................... ........................... ................. 94
4.5.2.1 Watermark Embedding and MMOH-CPE process................ 94
4.5.2.2 Watermark extraction Process and decryption......................... 95 4.6 Signal Processing and Security Analysis......... .......................................... 95
4.6.1 Security Analysis................................................................ 95 4.6.1.1 Visual Testing........................................................... 95 4.6.1.2 Statistical analysis...... ................................................ 96 4.6.1.3 Differential Analysis................................................... 97 4.6.1.4 Key sensitivity test... ...... ............................................. 97
4.6.2 Signal Processing Attacks Analysis............................................ 98
4.6.3 Simulation results............................ .. .................. .............. .... 98
4.7 Summary....................................................................................... 118
CHAPTERS:
Robust Secure and Blind Commutative DWT-DCT Biometric Watermarking
and Multi Map Orbit Hopping Chaotic Partial Encryption
5.1 Introduction... ...... ... ............................ ........... ... ... ... ...... ......... ... ...... 119 5.2 Related DCT & DWT -DCT watermarking and Chaotic Encryption.................. 119 5.3 Proposed CWPE 2D DWT DCT Algorithm.............................................. 132
5.3.1 Pre-processing Stage........................... ................................... 132 5.3.2 Processing Stage.... ............................................................ ... 132
5.3.2.1 Watermark Embedding and Encryption Steps..................... 133 5.3.2.2 Watermark Decryption and Extraction Steps....................... 134
5.4 Signal processing and Security Analysis.................................................. 134 5.4.1 Security Analysis.................................................................. 134
5.4.1.1 Statistical analysis.................................................. ... 135 5.4.1.2 Differential Analysis....................................... ............... 135
5.4.2 Signal Processing Attacks Analysis.......................................... ... 136
VI
5.4.3 Simulation results.............................................................. .... 136 5.5 Summary....... ..... ... ... ... ......... ......... .... ..... ... ...... ... ......... ...... ... ......... 167
CHAPTER 6:
Conclusions and Future Work
6.1 Conclusions.................................................................. ....................... 168 6.2 Future Works.................................................................................. 170
Publication Extracted from tbe Tbesis.............................................. 171
References................................................ ....................................... 172
VII
LIST OF FIGURES
Page
CHAPTER 2:
MULTIMEDIA PROTECTION OVERVIEW
Figure 2.1 Architecture of multimedia encryption and decryption 5
Figure 2.2 Architectures of symmetric complete encryption 6
Figure 2.3 Architectures of asymmetric cipher 7
Figure 2.4 Watermarking Processes 10
Figure 2.5 Example of least significant bit watermarking 18
Figure 2.6 Coefficients of block OCT 21
Figure 2.7 Marked region in 8x8 OCT block 23
Figure 2.8 Difference between Wave and Wavelet (a) wave (b) wavelet 24
Figure 2.9 One decomposition step of the two dimensional image 26
Figure 2.10 One DWT decomposition step 26
Figure 2.11 One composition step of the four sub images 27
Figure 2.12 Three decomposition steps of an image using Pyramidal Decomposition 27
Figure 2.13 Pyramid after three decomposition steps 28
Figure 2.14 Pyramidal decomposition of Lena image (1, 2 and 3 times) 28
Figure 2.15 Watermarking requirements 29
CHAPTER 3:
MULTI LEVEL 2D-DWT BASED SELECTIVE IMAGE CHAOTIC
PARTIAL ENCRYPTION
Figure 3.1
Figure 3.2
General architecture of a chaotic map
The limitations of Logistic iteration map
38
(a) iteration property when A. = 2.8, (b) iteration property when A. = 3.2. 39
Figure 3.3 Bifurcation diagram of the logistic map 40
Figure 3.4 Arnold Cat map with different control parameters a,b 41
Figure 3.5 Bases uses of Cryptographic hash function 42
Figure 3.6 Architecture of partial encryption/decryption 44
Figure 3.7 Typical architecture ofthe proposed chaos based image crypto systems 47
Figure 3.8 The proposed system block diagram ofElknz system 48
Figure 3.9 Multi-leveI2D-DWT-MMOH-CPE System 49
Figure 3.10 SKM sub-keys structure 50
Figure 3.11 Even eight sub-keys structure 51
Figure 3.12 Odd eight sub-keys structure 51
Figure 3.13 Multi-Map Orbit Hopping Chaotic Sub-system 51
Figure 3.14 The effect of one bit change in Encryption key 58
CHAPTER 4:
SECURE BIOMETRIC DWT WATERMARKING BASED ON MULTI
MAP ORBIT HOPPING CHAOTIC PARTIAL ENCRYPTION
(MMOH-CPE)
Figure 4.1
Figure 4.2
Figure 4.3
Figure 4.4
Figure 4.5
Figure 4.6
Figure 4.7
Figure 4.8
Figure 4.9
The proposed block diagram of the watermarking scheme
The flowchart of the proposed watermark embedding scheme
The watermark images embedding process
The watermark extracting process
Architecture of commutative watermarking and encryption
Behavioral and Physiological characteristics
Human Fingerprint Ridge and Valley
Fingerprint Core and Delta
Fingerprints and a fingerprint classification schema involving five
categories
Figure 4.10 Basic types (Ridge Ending, Bifurcation) and Some combinations of the
basic types.
Figure 4.11 A portion of a fingerprint where sweat pores (white dots on ridges) are
visible.
Figure 4.12 Flowchart of the minutiae extraction algorithm.
Figure 4.13 Fingerprint Image Normalization.
Figure 4.14 Good quality Fingerprint image histogram vs. a bad quality one
Figure 4.15 Fingerprint image Binarization and Thinning.
68
69
71
71
73
79
80
80
80
81
81
82
82
85
86
Figure 4. 16 Simple example for Minutiae extraction process based on eight
connected neighbors.
Figure 4. 17 Examples of typical false minutiae structures.
Figure 4. 18 Minutiae post-processing.
Figure 4. 19 Minutiae data.
Figure 4.20 Proposed CWPE 20 OWT subsystem.
Figure 4. 21 SKM sub-keys generation process.
Figure 4. 22 Arnold Cat Maps parameter generation process.
Figure 4.23 Multi-Map Orbit Hopping Chaotic Subsystem.
Figure 4. 24 Logistic Maps initial condition generation process.
Figure 4. 25 Arnold Cat Map Parameters generation process.
Figure 4. 26 1 L 20 OWT -based encrypted and decrypted Lena.
Figure 4. 27 The effect of one digit change in Encryption key.
CHAPTERS:
ROBUST SECURE AND BLIND COMMUTATIVE DWT-DCT
BIOMETRIC WATERMARKING AND MULTI MAP ORBIT
HOPPING CHAOTIC PARTIAL ENCRYPTION
Figure 5.1 Block diagram of the proposed method.
Figure 5.2 The watermark embedding block diagram.
Figure 5.3 Combined OWT -OCT watermark embedding procedure
Figure 5.4 Combined OWT -OCT watermark extraction procedure
87
88
88
89
91
92
93
93
94
94
95
97
120
127
128
128
Figure 5.5
Figure 5.6
Figure 5.7
Figure 5.8
The proposed block diagram of the joint OWT -OCT watermarking
algorithm (a) Joint OWT-OCT watermark embedding, (b) Joint DWT
OCT watermark extraction
Embedding and Extraction Algorithm Principle Block Diagram
Proposed CWPE lL 20 DWT OCT scheme
1 L 20 OWT OCT -based encrypted and decrypted Peppers
129
131
133
135
List of Tables
Table 2.1
Table 2.2
Table 3.1
Table 3.2
Table 3.3
Table 3.4
Table 3.5
Table 3.6
Table 3.7
Table 3.8
Table 3.9
Table 3.10
Table 3.11
Table 3.12
Table 3.13
Table 3.14
Table 3.15
LIST OF TABLES
Watermarking classification ...................................................... .
Properties of different DC coefficients ........................................... .
Comparison between Chaos and Cryptography Properties .................... .
Comparison between Classical and Chaotic Cryptography .................... .
Different standard gray scale tested images ..................................... .
Histogram analysis comparison between l-L, 2-L (2D-DWT-MMOH-
Page
11
22
37
37
56
CPE) Lena test image... ............................................................. 57
Security analysis comparison between l-L, 2-L (2D-DWT-MMOH-CPE)
Lena test image ...................................................................... . 58
Key sensitivity analysis comparison between l-L, 2-L (2D-DWT-MMOH-
CPE) Lena test image... ........................ ..................................... 58
Histogram analysis comparison between l-L, 2-L (2D-DWT-MMOH-
CPE) Fruit test image... .................................... ......................... 59
Histogram analysis comparison between l-L, 2-L (2D-DWT-MMOH-
CPE) Bird test image ............................................................... .
Histogram analysis comparison between l-L, 2-L (2D-DWT-MMOH-
CPE) Hat test image ................................................................. .
Histogram analysis comparison between 1-L, 2-L (2D-DWT-MMOH-
CPE) Baboon test image ........................................................... .
Security analysis comparison between l-L, 2-L (2D-DWT-MMOH-CPE)
using different standard gray scale tested images .............................. .
Security analysis comparison between l-L, 2-L (2D-DWT-MMOH-CPE)
Fruit test image ...................................................................... .
Security analysis comparison between l-L, 2-L (2D-DWT-MMOH-CPE)
Bird test image ....................................................................... .
Security analysis comparison between l-L, 2-L (2D-DWT-MMOH-CPE)
Hat test image ....................................................................... .
Security analysis comparison between l-L, 2-L (2D-DWT-MMOH-CPE)
60
61
62
63
63
63
63
63
List of Tables
Table 3.16
Table 4.1
Table 4.2
Table 4.3
Table 4.4
Table 4.5
Table 4.6
Table 4.7
Table 4.S
Table 4.9
Table 4.10
Table 4.11
Table 4.12
Table 4.13
Baboon test image ................................................................... .
Key sensitivity analysis comparison between lL, 2L (2D-DWT-MMOH-
CE) using different standard grey scale tested images..... .... ... ...... ... ..... 64
Overlaid Minutiae image and hexadecimal representation of the final
authenticated secrete system key.................................................. 90
Encrypted Watermarked image security analysis for different standard
gray scale test images under no signal processing attack ... " ...... , ....... .... 96
Encrypted watermarked image security and signal processing analysis
under (Salt & Peppers Noise Attack) Lena host image......................... 99
Encrypted watermarked image security and signal processing analysis
under (Speckle Noise Attack) Lena host image... .................................. 100
Encrypted watermarked image security and signal processing analysis
under (A WNG Noise Attack) Lena host image.................................. 101
Encrypted watermarked image security and signal processing analysis
under (Wiener Filter Attack - S &P - [3,3], 0.02) Lena host image....... ... 102
Encrypted Watermarked image security and signal processing analysis
under (Wiener Filter Attack - S &P - [5,5], 0.02) Lena host image ........ '" 1 03
Encrypted watermarked image security and signal processing analysis
under (Wiener Filter Attack - A WGN - [3,3], 0.02) Lena host
image................................................................................... 104
Encrypted watermarked image security and signal processing analysis
under (Wiener Filter Attack - A WGN - [5,5], 0.02) Lena host
image................................................................................... 105
Encrypted watermarked image security and signal processing analysis
under (Median Filter Attack - S &P - [3,3], 0.02) Lena host image...... ..... 106
Encrypted watermarked image security and signal processing analysis
under (Resizing Attack - 50%) Lena host image................................ 107
Encrypted watermarked image security and signal processing analysis
under (Resizing Attack - 75%) Lena host image..................................... lOS
Encrypted watermarked image security and signal processing analysis
under (JPEG. Compression Attack - 10%) Lena host image................... 109
List of Tables
Table 4.14
Table 4.15
Table 4.16
Table 4.17
Table 4.18
Table 4.19
Table 4.20
Table 4.21
Table 4.22
Table 4.23
Table 5.1
Table 5.2
Table 5.3
Table 5.4
Table 5.5
Table 5.6
Encrypted watermarked image security and signal processing analysis
under (JPEG. Compression Attack - 25%) Lena host image................... 110
Encrypted watermarked image security and signal processing analysis
under (Rotation Attack - 10°) Lena host image... ............................... III
Encrypted watermarked image security and signal processing analysis
under (Rotation Attack - 20°) Lena host image... ............................... 112
Encrypted watermarked image security and signal processing analysis
under (Cropping Attack- 25%) Lena host image............................... 113
Encrypted watermarked image security and signal processing analysis
under (Cropping Attack - 50%) Lena host image........ .......... .............. 114
Encrypted watermarked image security and signal processing analysis
under (Cropping Attack - 50%) Lena host image................................ 115
Encrypted watermarked image security and signal processing analysis
under (Cropping Attack - 50%) Lena host image.................. .............. 116
Encrypted watermarked image security and signal processing analysis
under (Cropping Attack - 50%) Lena host image.............. ....... ........... 117
Encrypted watermarked image security analysis under different signal
processing attacks for Lena test image............ ............... ................. 118
Encrypted watermarked image security analysis under no Attack for
different standard grey scale tested images... .................................... 118
Encrypted watermarked image security analysis under no attack......... ... 137
Encrypted watermarked image security and signal processing analysis
under (Salt & Peppers Noise Attack) Pepper test image... ... ... ......... ...... 138
Encrypted watermarked image security and signal processing analysis
under (Speckle Noise Attack) Pepper test image................................ 139
Encrypted watermarked image security and signal processing analysis
under (A WNG Noise Attack) Pepper test image......... .................... ... 140
Encrypted watermarked image security and signal processing analysis
under (Wiener Filter Attack - S &P - [3,3],0.02) Pepper test image......... 141
Encrypted watermarked image security and signal processing analysis
under (Wiener Filter Attack - S &P - [5,5],0.02) Pepper test image......... 142
List of Tables
Table 5.7 Encrypted watermarked image security and signal processing analysis
under (Wiener Filter Attack - A WGN - [3,3], 0.02) Pepper test image....... 143
Table 5.8 Encrypted watermarked image security and signal processing analysis
under (Wiener Filter Attack - A WGN - [5,5], 0.02) Pepper test image... .... 144
Table 5.9 Encrypted watermarked image security and signal processing analysis
under (Median Filter Attack - S &P - [3,3],0.02) Pepper test image.... ..... 145
Table 5.10 Encrypted watermarked image security and signal processing analysis
under (Median Filter Attack - S &P - [5,5], 0.02) Pepper test image..... .... 146
Table 5.11 Encrypted watermarked image security and signal processing analysis
under (Median Filter Attack - A WGN - [3,3], 0.02) Pepper test image... ... 147
Table 5.12 Encrypted watermarked image security and signal processing analysis
under (Median Filter Attack - AWGN - [5,5], 0.02) Pepper test image...... 148
Table 5.13 Encrypted watermarked image security and signal processing analysis
under (Resizing Attack) Pepper test image...... ... ... ............... ... ...... ... 149
Table 5.14 Encrypted Watermarked image security and signal processing analysis
under (Resizing Attack) Pepper test image... .... ....................................... 150
Table 5.15 Encrypted Watermarked image security and signal processing analysis
under (Compression Attack) Pepper test image.......... ........... ............. 151
Table 5.16 Encrypted Watermarked image security and signal processing analysis
under (Compression Attack) Pepper test image................................. 152
Table 5.17 Encrypted Watermarked image security and signal processing analysis
under (Rotation Attack) Pepper test image... .................................... 153
Table 5.18 Encrypted Watermarked image security and signal processing analysis
under (Rotation Attack) Pepper test image....................................... 154
Table 5.19 Encrypted Watermarked image security and signal processing analysis
under (Cropping Attack) Pepper test image.................. ...... ........... ... 155
Table 5.20 Encrypted Watermarked image security and signal processing analysis
under (Cropping Attack) Pepper test image................................... ... 156
Table 5.21 Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only
for encrypted watermarked image security analysis for different standard
gray scale images under no signal processing attack............... .......... .. 157
XI
List 0/ Tables
Table 5.22
Table 5.23
Table 5.24
Table 5.25
Table 5.26
Table 5.27
Table 5.28
Table 5.29
Table 5.30
Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only
for encrypted watermarked image security analysis under different attacks
Lena host image...................................................................... 158
Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only
for Encrypted Watermarked image security and signal processing analysis
under No Attack Lena test image... ......... ......... ...... ..................... ... 159
Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only
for Encrypted Watermarked image security and signal processing analysis
under (Median Filter Attack - S &P - [3,3],0.02) Lena test image........ ... 160
Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only
for Encrypted Watermarked image security and signal processing analysis
under (Resizing Attack 50%) Lena test image............... .................... 161
Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only
for Encrypted Watermarked image security and signal processing analysis
under (JPEG. Compression Attack - 10%) Lena test image.................... 162
Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only
for encrypted watermarked image security and signal processing analysis
under no Attack Pepper test image.................. ... ........................... 163
Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only
for encrypted watermarked image security and signal processing analysis
under (Median Filter Attack - S &P - [3,3], 0.02) Pepper test image......... 164
Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only
for encrypted watermarked image security and signal processing analysis
under (Resizing Attack 50%) Pepper test image... . .. ... .. .... ... ......... ..... 165
Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only
for encrypted watermarked image security and signal processing analysis
under (JPEG. Compression Attack - 10%) Pepper test image...... ............ 166
XII
C
E
P
K
X'
X"
Embd(.)
Ext(. )
d(.)
[. ]
y
L
Rx".w
T
XCm,n)
XCi,j)
p
let)
'" Ce) cp(x)
Original media
Encryption operation
Cipher media
Encryption key
Public key
Private key
Decryption operation
Original media or Original counterpart
Watermark
Marked media or Watermarked media
Test media or Attacked media
Embedding process
Extraction process
Detection process
LIST OF SYMBOLS
Means that the element in the bracket may be optional
Positions to be embedded
Gain factor
Watermark length
Correlation between the possibly attacked image (X',), and the watermark
(W)
Pre-determined threshold
Selected coefficient position
Selected coefficient position
Positive value
SpatiaVtemporal domain signals
Mother wavelet function
One dimensional scale factor
I j / I; /1 I' I 1'111/ I 'II( Iff I' I/.
XIII
l\J(x)
t/JH (x, Y)
t/JV(X,y)
t/JD(X, y)
<pCy)
l\JCy)
<p(X, y)
L
D(L)
a
b
L xn+l
yk L
Yn+1
h
Y
M
k
p
n
Ci
EiO
Ki
DiO
Xn
r
Wavelet related to <p(x)
Horizontal wavelet analysis
Vertical wavelet analysis
Diagonal wavelet analysis
One dimensional scale factor
Wavelet related to <p(y)
Two dimensional discrete wavelet analysis
Number of decompositions
Number of subbands results from L decompositions
Secrete control parameter
Initial condition
Arnold parameter
i\rnold parameter
Original pixel position
New position of the original pixel position after using Cat map
Original pixel position
New position of the original pixel position after using Cat map
Cryptographic hash function
Output of cryptographic hash function
message
Key
Original media content
Number of portioned parts of original media content
ith cipher-part or Encrypted media content
Encryption algorithm
key
Decryption algorithm
System variable
System parameter
1/ III flflll' I II ,t/ 1/(/1 /II/! (ll 1/ I///f/ I I1I11 Ifi 1IIIIIIIIIf II/ II ! r II/II I/.
XIV
n
J Xi o
{x~}~=o X
P(x)
a
[(i,j)
[,(i,j)
(x,y)
D
(i,j)
w(i,j)
w'(i,j)
Number of chaotic orbit
logistic map index
logistic maps initial values
Series are computed
Orbit position
Permutation of x
Positive integer number
Original image pixel values
Encrypted image pixel values
Grey scale values of two adjacent pixels in the image
Correlation coefficients
Bipolar array
Grid
Original watermark pixel
Extracted watermark pixel
I II! I I flfl 1/ I 1/ 1/111 III frr/flll! ! I I! IIIJIII I 'f Ifl( If '"
xv
AWGN
S&P
JPEG
MATLAB
DWT
DCT
2D
ML
lL
MMOH-CPE
DVD
MP3
QoS
DES
AES
IDEA
GIF
DC
LSB
DFT
IDCT
STFT
IDWT
HVS
HAS
ID
TV
PDA
LIST OF ABBREVIATIONS
Additive White Gaussian Noise
Salt and Peppers Noise
Joint Photographic Experts Group.
Matrix Laboratory (Mathworks, Inc.)
Discrete Wavelet Transform
Discrete Cosine Transform
Two Dimensional
Multi-Level
One Level
Multi Map Orbit Hopping Chaotic Partial Encryption
Digital Voice Recorder
Moving Picture Experts Group Layer-3 Audio (file format)
Quality of Services
Data Encryption Standard
Advanced Encryption Standard
International Data Encryption Algorithm
Graphics Interchange Format
Direct Current
Least Significant Bit
Discrete Fourier Transform
Inverse Discrete Cosine Transform
Short Time Fourier Transform
Inverse Discrete Wavelet Transform
Human Visual System
Human Auditory System
Identification
Television
Personal Digital Assistant
XVI
MACs
SHA
SHS
MD4
PE
PSNR
MPEG4
M-L2DDWT
SKM
LL
CA
HL
CH
LH
CV
HH
CD
OHS
NPCR
UACI
ID
MPEGI
MPEG2
AC
BMP
CWE
MACs
M-L2DDWT
SKM
SRNG
CWPE
Message Authentication Codes
Secure Hash Algorithm
Secure Hash Standard
Message Digest Four
Partial Encryption
Peak Signal to Noise Ratio
Moving Picture Experts Group Four
Multi-Level two dimension Discrete Wavelet Transform
Secure Key Management subsystem
Low Low subband
Approximation Coefficients
High Low subband
Horizontal Coefficients
Low High subband
Vertical Coefficients
High High subband
Diagonal Coefficients
Orbit Hopping Selector
Number of Pixels Change Rate
Unified Average Changing Intensity
One Dimensional
Moving Picture Experts Group one
Moving Picture Experts Group two
Alternative Current
Bitmap Image File Format
Commutative Watermarking and Encryption
Message Authentication Codes
Multi-Level two dimensions Discrete Wavelet Transform
Secure Key Management
Selective Random Number Extractor
Commutative Watermarking and Partial Encryption
XVII
MMOH
CPE
WPE
CDMA
T
ROI
PN
NCC
Multi Map Orbit Hopping
Chaotic Partial Encryption
Watennarking and Partial Encryption
Code Division Multiple Access
Threshold
Region of Interest
Pseudo Number
Nonnalized Cross Correlation
XVID
Publication Extracted from the Thesis
Publication Extracted from the Thesis
1 Mohamed S. El-Mahallawy, Esam A. Hagras, Ahmed Zein
Eldin, and Mohamed Waleed Fakhr. 2011. " Robust Blind
and Secure Biometric Watermarking Based on Partial
Multi-Map Chaotic Encryption " New Technologies ,
Mobility and Security (NTMS), 4th IFIP International
Conference
2 Mohamed S. El-Mahallawy, Esam A. Hagras, Ahmed Zein
Eldin, and Mohamed Waleed Fakhr. 2011. " Selective
Image Encryption Based on Multi-Level 2D-DWT and
Multi-Map Chaotic Partial Encryption", The Malaysian
Journal of Remote Sensing & GIS, June 2011, Vol. 2(1)
3 Esam A. Hagras, Mohamed S. El-Mahallawy, Ahmed Zein
Eldin, and Mohamed Waleed Fakhr. 2011. " DWT-DCT
based Robust Secure and Blind Commutative
Watermarking And Partial Multi Map Chaotic Encryption
", The International journal of Multimedia & Its
Applications, (IJMA), November, 2011, Vol 3(3)
171
References
REFRENCES [1] S. A Yanstone, A J. Menezes, and P. C. Oorschot, 1996. Handbook of Applied
Cryptography. Boca Raton: CRC Press.
[2] Shiguo Lian, 2008. Multimedia Content Encryption: techniques and applications.
Boca Raton. CRC Press.
[3] J. Cox, Matthew L. Miller, Jeffrey A Bloom, Jessica Fridrich, and Ton Kalker , 2008.
Digital Watermarking and Steganography, 2nd ed. London. Elsevier Publishing.
[4] Arnold Michael, 2003.Techniques and Applications of Digital Watermarking and
Content Protection. London. Artech House computer security series.
[5] Jeng-Shyang Pan, Hsiang-Cheh Huang and Lakhmi C. Jain, 2004. Intelligent
Watermarking Techniques. London. World Scientific Publishing.
[6] Chun-Shien Lu., 2004. Multimedia Security: Steganography and Digital
Watermarking Techniques for Protection ofIntellectual Property. London. Idea group
Publishing.
[7] Mintzer, F., Braudaway, G.W., and Yeung, M.M. 1997. Effective and ineffective
digital watermarks. International Conference on Image Processing Proceedings, ICIP
97, Yol (3), 9-12.
[8] AM.Tekalp, 1995. Digital Video Processing. London. Prentice Hall.
[9] Saraju P. Mohanty, 1999. Digital Watermarking: A Tutorial Review. [online],
available from
http://www .cse.unt.eduJ-smohanty/research/OtherPublicationsfMohantyWatennarkin
gSUIVey1999 .pdf
[10] Lang Zhai, Qi Hu, Jilin Bus and Changchun. 2011. Researches on digital image
watennarking algorithm in DWT domain with chaotic encryption. 2nd International
Conference on Artificial Intelligence, Management Science and Electronic Commerce
(AIMSEC),pp,3321-3324
[11] Arnold, M., 2002. Audio watermarking: Features, applications and algorithms. IEEE
International Conference on Multimedia and Expo, vol (2),1013-1016.
[12] C. E.T. Lin and E. J. Delp. 2000. Detection of Image Alterations Using Semi-fragile
Watermarks, SPIE Int. Conf. on Security and Watermarking of Multimedia Contents,
172
References
vol (3971),152-163.
[13] R. D. J. Fridrich, M. Goljan. 2001. Invertible Authentication Watermark for JPEG
Images. Information Technology: Coding and Computing, 223 - 227.
[14] Ruanaidh, J.O., Dowling, W.J., & Boland, F.M. 1996. Watermarking digital images
for copyright protection. IEEE Proceedings on Vision, hnage and Signal Processing,
143(4),250-256.
[15] Harpuneet Kaur, 2006. Robust hnage Watermarking Technique to Increase Security
and Capacity of Watermark Data Thesis (Msc). Deemed University.
[16] Wen-Nung Lie, Guo-Shiang Lin, Chih-Liang Wu, and Ta-Chun Wang. Robust Image
Watermarking On the DCT Domain. 2000, IEEE International Symposium on
Circuits and Systems (IS CAS 2000), vol (1), 228-231.
[17] Langelaar, G.C., Setyawan, 1, and Lagendijk, R.L. 2000. Watermarking digital image
and video data: A state-of-the-art overview. IEEE Signal Processing Magazine, vol
(17),20-46.
[18] Jun Xiao and Ying Wang. 2008. Toward a Better Understanding ofDCT Coefficients
in Watermarking. IEEE Pacific-Asia Workshop on Computational Intelligence and
Industrial Application, vol (2),206-209.
[19] Daubechies I, 1988. Time-frequency localization operators: A geometric phase space
approach. IEEE Trans. Information Theory, 34(4), 605-612.
[20] Daubechies I, 1990. The wavelet transform, time-frequency localization and signal
analysis. IEEE Trans. Information Theory, 36(5).961-1005.
[21] Mallat S G. 1989. A theory of multi resolution signal decomposition: The wavelet
representation. IEEE Trans. Pattern Analysis and Machine Intelligence, 11 (7), 674-
693.
[22] Marc Antonini, Michel Barlaud, Pierre Mathieu, Ingrid Daubechies. 1992. Image
coding using wavelet transform. IEEE Trans. hnage Processing, 1 (2),205-220.
[23] Reza Safabakhsh, Shiva Zaboli and Arash Tabibiazar. 2004. Digital Watermarking on
Still hnages Using Wavelet Transform. Proceedings of the International Conference
on Information Technology: Coding and Computing, (ITCC 2004), vol (1),671-675.
[24] Ruanaidh, 1.0., Boland, F., and Dowling, W. 1996. Phase watermarking of digital
images. International Conference on hnage Processing Proceedings, ICIP 96, vol (3),
173
References
239-242.
[25] Voyatzis, G., Nikolaidis, N., and Pitas, 1. 1998. Digital watennarking an overview.
Proceedings EUSIPCO, vol (1), 13-16.
[26] Swanson, M.D., Zhu, B., and Tewfik, A.H. 1998. Multiresolution scene based video
watermarking using perceptual models. IEEE Journal on Selected Areas in
Communications, 16(4),540-550.
[27] Liang Zhao et aI. 2010. Image Encryption Design Based on Multi-Dimensional
Matrix Map and Partitioning Substitution and Diffusion-Integration Substitution
Network Structure. Infonnation Science and Applications (ICISA), 1-8
[28J Hossam EI-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah, 2007. An
Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and
Decryption. Infonnatica, (Magazine/Journal), 31(1), 121-129.
[29] Haojiang Gao, Yisheng Zhang, Shuyun Liang and Dequn Li. 2006. A new chaotic
algorithm for image encryption. Elsevier, 29(2),393-399
[30] Wong, K.W, Kwok, B.S.H. and Law, W.S. 2008. A fast image encryption scheme
based on chaotic standard map. [online]
http://arxiv.orglftp/cs/papers/0609/0609158.pdf
[31] David Arroyo, Gonzalo Alvarez and Veronica Fernandez. 2009. A Basic Framework
for the Cryptanalysis of Digital Chaos Based Cryptography. 6th International Multi
Conference on Systems, Signals and Devices, SSD '09, 1-6.
[32J Zhi-Hong Guan , Fangjun Huang and Wenjie Guan. 2005. Chaos-based image
encryption algorithm. Elsevier ,Physics Letters, 153-157.
[33] Zhu Liehuang, Li Wenzhuo, Liao Lejian, and Li Hong. 2006. A Novel Image
Scrambling Algorithm for Digital Watennarl<ing Based on Chaotic Sequences.
UCSNS International Journal of Computer Science and Network Security, 6 (8B),
125-130.
[34] William Stallings. 1999. Cryptography and network security, London, Prentice Hall
[35] Lala Krikor, Sami Baba, Thawar Arif and Zyad Shaaban. 2009. Image Encryption
Using DCT and Stream Cipher. European Journal of Scientific Research, 32 (1), 47-
57.
[36] Pareek, N.K., Patidar, V. and Sud, K.K., 2005. Cryptography using multiple one-
174
References
dimensional chaotic maps, Communications in Nonlinear Science and Numerical
Simulation, Vol(10), 715-723.
[37] Pareek, N.K., Patidar, V. and Sud, K.K., 2003, Discrete chaotic cryptography using
external key, Phys. Lett. A, vol(309), 75-82.
[38] Behnia, S., Akhshani, A., Mahmodi, H. and Akhavan, A. 2008. A novel algorithm for
image encryption based on mixture of chaotic maps, Chaos Solitons Fractals, vol(35),
408-419.
[39] Lian, S. and Wang, Z., 2003. Comparison of several wavelet coefficients confusion
methods applied in multimedia Encryption. Int. Conference on Computer Networks
and Mobile Computing (ICCNMC 03),372-376.
[40] Ginesu, G., Onali, T. and Giusto, D.D., 2006, Efficient Scrambling of Wavelet-based
Compressed Images, A comparison between simple techniques for mobile
applications. 2nd International Mobile Multimedia Communications Conference.
[41] Li, S., Chen, G., 2004. Chaos-Based Encryption for Digital Images and Videos,
Multimedia Security Handbook, CRC Press, vol(4), 133-167,2004.
[42] Pei-pei LID, Zhong-liang ZHU, Hong-xia WANG and Tian-yun Y AN. 2008. A Novel
Image fragile watermarking Algorithm Based on Chaotic Map. Congress on Image
and Signal Processing, CISP 08, 631-634
[43] G.A.Sathishkumar , K.Bhoopathy bagan and N.Sriraam. 2011. Image Encryption
Based on Diffusion and Multiple Chaotic Maps. International Journal of Network
Security & Its Applications (UNSA), 3(2), 181-194.
[44] Said EI-Khamy, M. Abou EI-Nasr and Amina EI-Zein. 2009. An Encryption Scheme
for Images Based on the DWT and a Chaotic Cipher. Radio Science Conference,.
NRSC 2009, 1-10.
[45) Ahmed A. Abdel wahab and Lobna A. Hassaan. 2008. A Discrete Wavelet Transform
Based Technique For Image Data Hiding. 25th National Radio Science Conference
(NRSC 2008), 1-9.
[46) Xiang, T., Wong, K. W. and Liao, X., 2007. A novel symmetrical cryptosystem based
on discretized two-dimensional chaotic map, Phys. Lett A, vol (364), 252-258.
[47] Jui-Cheng Yen, Hun-Chen Chen, and lui-Hsiang Juan. 2006. Blind Watermarking
Based on The Wavelet Transform. Proceedings of the Seventh International
175
References
Conference on Parallel and Distributed Computing, Applications and Technologies
(pDCAT'06), 474 -478.
[48] Clara Cruz Ramos et al. Watermarking-Based Image Authentication System in the Discrete Wavelet Transform Domain. On line http://www.intechopen.comlsource/pdfslI8614IInTech Watermarking_based _image_authentication _system_in _the_discrete wavelet transfo ~~~~ - -
[49] WANG Hui-qin, SHANG Fei, 11 Qi-chun and HAO Ji-chao. 2009. Robust Digital
Watermarking Adopting Barcode in Image. The 1st International Conference on
Information Science and Engineering (ICISE2009) , 660-662.
[50] Ke Luo and Xiaolin Tian. 2008. A New Robust Watermarking Scheme based on
Wavelet Transform. Congress on Image and Signal Processing. 312-316.
[51] Li Fan and Tiegang Gao. 2009. A Novel Blind Robust Watermarking Scheme Based
on Statistic Characteristic of Wavelet Domain Coefficients. International Conference
on Signal Processing Systems, 121-125.
[52] Osamah M. Al-Qershi and Khoo Bee Ee. 2009. A Comparison Between Block-Based
and Non Block-Based Watermarking Schemes based on DWT. Second International
Symposium on Electronic Commerce and Security (pp:l69-173)
[53] Ji-Hong Chen and Chin-Hsing Chen. 2009. A Watermarking Scheme Using Code
Division Multiple Access and DWT. Fifth International Conference on Intelligent
Information Hiding and Multimedia Signal Processing, 13-16.
[54] Shiguo Lian. 2009. Quasi-commutative watermarking and encryption for secure media content distnbution. Journal of Multimedia Tools and Applications, 43(1).
[55] S. Lian, Z. Liu, Z. Ren, and H. Wang. 2007. Commutative encryption and
watermarking in compressed video data. IEEE Circuits and Systems for Video
Technology 17(6). 774-778.
[56] Said E. El-Khamy, M. A. El-Nasr, and Amina H. El-Zein. 2009. A Partial image
encryption scheme based on ELKINZ chaotic stream cipher. MASAUM Journal of
basic and applied sciences, 1(3),389- 394.
[57] Li Li , He-Huan Xu, Chin-Chen Chang and Ying-Ying Ma. 2011. A novel image watermarking in redistributed invariant wavelet domain. Elsevier, The Journal of Systems and Software. 1-7
[58] P.Ramman, Munage.V.N.K.Prasad, and D.Sreenivasa Rao2009. Robust Digital
Watermarking of Jmages using Wavelets. International Journal of Computer and
176
References
Electrical Engineering, 1(2), 111-116.
[59] TianKai Sun, XiaoGen Shao, and XingYuan Wang,. 2009. A Novel Binary Image
Digital Watennarking Algorithm Based on DWT and Chaotic Encryption. The 9th
International Conference for Young Computer Scientists, 2797-2802.
[60] Amit Mendiratta, Anil Dahiya, Asok De and Navin Rajpa1, 2007. Chaos Based Audio
Watermarking. International Conference on Computational Intelligence and
Multimedia Applications, 64-69.
[61] LID Nian-sheng, YANG, GUO Dong-hui, and CHENG L. L, 2008. A New Wavelet
Watermark Scheme of Color Image Based on Chaotic Sequences. International
Conference on Intelligent Information Hiding and Multimedia Signal Processing, 994-
998.
[62] Qiang Wang, Qun Ding, Zhong Zhang and Lina Ding,. 2008. Digital Image
Encryption Research Based on DWT and Chaos. Fourth International Conference on
Natural Computation, 494-498.
[63] Shiguo Lian, Zhongxuan Liu, Ren Zhen, and Haila Wang. 2006. Commutative
watermarking and encryption for media data. SPIE Digital Library, 45(8).
[64] Fu Yu, Wu Xiaoping, Chen Zemao, Ye Qing. 2008. A Wavelet Digital Watennarking
Algorithm Based on Chaotic Mapping. International Symposium on Electronic
Commerce and Security, 886-889.
[65] Huang Hui-fen. 2009. Perceptual image watermarking algorithm based on Magic
Squares Scrambling in DWT. 5th International Joint Conference on INC, IMS and
IDC.1819-1822.
[66] Gursharanjeet Singh Kalra , Rajneesh Talwar and Harsh Sadawarti. 2011. Robust
Blind Digital Image Watermarking Using DWT and Dual Encryption Technique.
2011 Third International Conference on Computational Intelligence, Communication
Systems and Networks, 225-230.
[67] Jila Ayubi, Shahram Mohanna, Farahnaz Mohannaand, and Mehdi Rezaei. 2011. A
Chaos Based Blind Digital Image Watermarking in The Wavelet Transform Domain.
DCSI International Journal of Computer Science, 8(4),192-199.
[68] Anil K. Jain, Patrick Flynn, Arun A. Ross. 2008. Handbook of Biometrics, Springer
Science, Business Media, LLC.
177
References
[69] AZain et aL 2009. Fingerprint-Based Biometric Authentication System for Theft
Proof Cars, (Graduation Project AAST)
[70] Anil Jain and Sharath Pankanti . Fingerprint Classification and Matching. [online],
available from
http://citeseerx.ist.psu.eduiviewdoc/summary?doi=10.1.1.5.6484
[71] Davide Maltoni, Dario Maio,Salil, Anil K. Jain and Prabhakar. 2003. Handbook of
Fingerprint Recognition. Springer-Verlag New York Berlin Heidelberg
[72] Lin Hong, Yifei Wan, and Anil Jain. 1998. Fingerprint Image Enhancement:
Algorithm and Performance Evaluation. IEEE Transaction on Pattern Analysis and
Machine Intelligence, 20(8),777-789.
[73] M. Kawagoe and A Tojo. 1998. Fingerprint Pattern Classification, Pattern
Recognition, 17(3), 295-303.
[74] Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu. 2008.
Fingerprint Verification System using Minutiae Extraction Technique. Proceeding of
World Academy of Science, Engineering and Technology, vol (36), 497- 502.
[75] Xinjian Chen, Jie Tian, liangang Cheng and Xin Yang. 2004. Segmentation of
Fingerprint Images Using Linear Classifier. EURASIP Journal on Applied Signal
Processing, vol (4), 480--494.
[76] Raymond Thai. 2003 Fingerprint Image Enhancement and Minutiae Extraction.
Thesis [Msc]. The University of Western Australia.
[77] Khalil Zebbiche, Lahouari Ghouti, Fouad Khelifi and Ahmed Bouridane.2006.
Protecting Fingerprint Data using Watermarlcing. Proceedings of the First NASA/ESA
Conference on Adaptive Hardware and Systems (AHS'06).
[78] A J. Ahumada and H. A Peterson. 1992. Luminance- model based OCT quantization
for color image compression. Proc. SPIE: Human Vision, Visual Processing, and
Digital Display. SPIE press, 365-374.
[79] C. 1. Zhang and M. Y. Fu. 2003. Infrared Image De-noising Based on Discrete
Stationary Wavelet Transform. Optical technique, vol (29), 250-256.
[80] N. Li, X. S. Zheng, Y.I. Zhao, H.M. Wu and S.F. Li. 2008. Robust Algorithm of
Digital Image Watermarking Based on Discrete Wavelet Transform. IEEE Symp_
Electronic Commerce and Security, 942-945.
178
Rejerellces
[81] J. x.. Liu and Z. M. Lu. 2008. DWT and DCT Combined Robust Watermarking
Algorithm Based on Vector Quantization with Labeled Codewords. Proc. IEEE Conf,
Anti-counterfeiting, Security, and Identification in Communication (ASID'08) 51-54.
[82] J. Liu, F. Gao and H. Zbang. 2008. A Blind Watermark Algorithm in Mixed
Transform Domain Based on Chaotic Sequence Locating. IEEE Coof. Innovative
Computing Information and Control (ICICIC'08, 23-27.
[83] A. F. Hu and N. Chen. 2008. A Blind Watermarking Algorithm for Color Image
Based on Wavelet Transform and Fourier Transform. Proc. IEEE Conf, Young
Computer Scientists (ICYCS'08), 1453-1458.
[84] J. F. Delaigle, C. De Vleeschouwer and B. Macq. 1998. Watermarking algorithm
based on a human visual model. Signal Processing, vol(66), 319-335.
[85] Y. Z. Li, H. Zhu, R. Q. Yu, G. Yang, and J. Xu. 2008. An Adaptive Blind
Watermarking Algorithm Based on DCT and Modified Watson's Visual Model. Proc.
IEEE Symp. Electronic Commerce and Security, 904-907.
[86] X. F. Zhao. 2003. Digital image scrambling based on baker's transformation. Journal
of Northwest Normal University (Nature science), 26-29.
[87] I. 1. Cox, 1. Kilian, F. T. Leighton and T. Shamoon. 1997. Secure spread spectrum
watermarking for multimedia. IEEE Trans. Image processing, vol (6), 1673-1687.
[88] S. Voloshynovskiy, S. Pereira, V. Jquise and T. Pun. 2001. Attack Modeling: Towards
a second generation watermarking benchmark. Signal Processing, Special Issue on
Information Theoretic Issues in Digital Watermarking, Elsevier, vol (81), 1177-1214.
[89] K. Janthawongwilai and T. Amomraksa. 2004. Improved Performance of Amplitude
Modulation Based Digital Watermarking. IEEE Symp. International Symposium
Communications and Information Technology (ISCIT'04), 318-323.
[90J M. W. Zhao and Y. Z. Dang. 2008. Color Image Copyright Protection Digital
Watermarking Algorithm Based on DWT &DCT. Proc.IEEE Conf, Wireless
Communications, Networking and Mobile Computing (WiCOM'08), 1-4.
[91] Xi Chen and Shiguo Lian. 2010. On the OCT Based Joint Fingerprint Embedding and
Decryption Scheme. Journal of Multimedia, 5(5), 473-480.
[92J D. Kundur and K. Karthik. 2004. Video fingerprinting and encryption principles for
179
References
digital rights management. Proceedings of the IEEE, 92(6) 918-932.
[93] Musheer Ahmad, Omar Farooq and Jonathan Blackledge. 2010. Chaotic image
encryption algorithm based on frequency domain scrambling. Information Processing
Letters
[94] Neminath Hubballi and Kanyakumari D P. 2009. Novel DCT based watermarking
scheme for digital images. International Journal of Recent Trends in Engineering,
1(1),430-433.
[95] Saeid Saryazdi and Mehrnaz Demehri, 2005. A Blind DCT Domain Digital
Watermarking. 3rd International Conference: Sciences of Electronic, Technologies of
Information and Telecommunications SETIT
[96] Sadik Ali M. AI-Taweel, Putra Sumari, Saleh Ali K. Alomari and Anas J.A. Husain.
2009. Digital Video Watermarking in the Discrete Cosine Transform Domain. Journal
ofCornputer Science, 5 (8),536-543.
[97] Chi-Man Pun, 2009. High Capacity and Robust Digital Image Watermarking. Fifth
International Joint Conference on INC, IMS and IDC
[98] Shikha Tripathi, R.C. Jain and V. Gayatri. 2006. Novel DCT and DWT based
Watermarking Techniques for Digital Images. The 18th International Conference on
Pattern Recognition (ICPR'06)
[99] Rakhi Dubolia , Roop Singh, Sarita Singh Bhadoria and Rekha Gupta, 2011. Digital
Image Watermarking by Using Discrete Wavelet Transform and Discrete Cosine
Transform and Comparison Based on PSNR. International Conference on
Communication Systems and Network Technologies, 593-596.
[100] Mohamed Al Baloshi and Mohammed E. AI-Mualla. 2007. A DCT-Based
Watermarking Technique for Image Authentication. International Conference on
Computer Systems and Applications. IEEE/ACS IEEE, 754-760.
[10l] Shanshan Zhang, Xiaohong Wang, Shizheng Zhou. 2011. The Research of Image
Watermarking Encryption Algorithm. Fourth International Joint Conference on
Computational Sciences and Optimization, 821-824.
[102] Yanling Wang and Xiuhua Ji. 2009. A New Algorithm For Watermarking Based On
DCT and Chaotic Scrambling. 4th International Conference on Computer Science &
180
References
Education, 1957-1961.
[103] Gengming Zhu, Nong Sang,DeshegXiang and Shaobo Zhang. 2008. Watennark
Algorithm Research and Simulation Based on Different Frequency Coefficients.
International Conference on Advanced Computer Theory and Engineering, 271-275.
[104] ZHAO Rui-mei, LIAN Hua ,PANG Hua-wei , and HU Bo-ning. 2009. A Blind
Watermarking Algorithm Based on DCT. Second International Symposium on
Intelligent Information Technology Application. 821-824.
[105] Ali AI-Haj. 2007. Combined DWT-DCT Digital Image Watennarking. Journal of
Computer Science, 3 (9), 740-746.
[106] Saied Amirgholipour Kasmani and Ahmadreza Naghsh Nilchi. 2008. A New Robust
Digital Image Watennarking Technique Based On Joint DWT-DCT Transfonnation.
3rd International Conference on Convergence and Hybrid Infonnation Technology,
539-544.
[107] Wang Na,Wang Yunjin and Li Xia. 2009. A novel Robust Watennarking Algorithm
Based on DWT and DCT. Computational Intelligence and Security, CIS '09,437-441.
[l08) Guangyong Gao, 2010. A Blind Grayscale Watermark Algorithm Based on Chaos and
Mixed Transform Domain. 2nd International Conference on Computer and
Automation Engineering (ICCAE), vol (1), 658-662.
[109] Liu Yuejun, 2010. Research on Information Hiding System based on OCT Domain.
Second International Conference on Computer Modeling and Simulation, 11-14.
181
~J (Approximation Coefficients) ~..foll -=...~\-11 JIJ:.j} (Discrete Cosine Transform)
¥WI ~I t...Jj ~ ~I..?")' (Mid Band Frequencies) ~jWI ~I -=...1.3 -=...I.l.lyll ~I~}
~ . .:.~ .. -II~·~·II-=...I.l.l·~II -,,~ \i.W I_' w .. ~ .>- Y'r=--...J ~~~.
'il ~ •· .. --11 ~ .11 "::"UWI .. ,j .1 .~ 1 '- ~ .1 u.' ru.. I'- L ~. . ~ ~ y ~. u- ~~. ~ _ ..r.y~ & y ~ r~ ..
.l;lji r\..l:.j J)\..:i.. w-a";Y" Ctii... ~ ~ J Wjill \.l,Iooo JJi'il..;~ c~ \t-ol~} J (Fingerprint)
.(Sub Key Management) ~.fo.JI ~..>i11 ~1.i.JI
, .. : . .t~I ..; ,,~ ~ (Security Analysis) c.;1...';I J ~I J:W "I.»! ~ c.fo.J1 r\.l;.,.ill ~I ~J ~
.C.fo.J1 rUi.Jl1 .,,\..is J • .,! loS::"" ~\:ij}1 ,-,i"';\ J ~WI
Signal Processing) ...J.,-lJ ~I 4l\.-l1 -=...4Loc- ~IY" ~ c.fo.J1 rUi.JlI ~w ~ r3 ~ I·. \....utA· •. ~II .,t..i~11 ' .. '~'1 .,,~"il .- .--11 .- .l::.&....;.J\S(Anal . '--'"""":! • Y.C J ~ Y' J 0-- J (.)'U~ J . ~ J ~ ~ J YSIS
~';I ~ 1.~Lb. ~WI ~I I . - I - ~. ~ ' .. 11 ~Wl ~I '- I .L.:. ~ • '1t"'. J _ ~ ~. ~ ~...J J J...J..r' _ ~ ~
.' 1··'1 . 4.i.U:..J1 ~ ~. 1- .....wI1· -=...1· .. I··'I·I:.·A . Ute. 4.i.Lb. ~ ~ ',_'1 ~.Y""..r. . ~"i'"' J . ;-..Y"" r--..r. " .. J...J..r'
.-:-':.11 Ui.Jl1 -:""L~. 1.11 ~l..ltJ ·-:-':·'1 \..l:>.ll1 . .J. (OI'AO) .--11 ··.l:.a......;JI .h....~_I\ • ·~'I c~ r ~&Y .. "c~ r <,?"/O ~ ~J J.>- ~Y'
II I<.l§ 4.i.\..h.o ~ ~ ". _'I ~';1 ~ 1.~\..h.o ~WI ~I "I . ~ 1 ~ \ .11 ~l..ltJ <-r. ........... " •. J...J..r' • . '1t"'" J. ~ ~. i'"' & y . . .
r~I i.J."..,. ~ iJ.o ~)I ~.J ~! J.-: i.Jy.o::JI wl..)""" iJ.o J!1 ).u... ~ ~ .sy....,JI ~\.illl
• .sy....,JI .s..l6. YI
.,si ~~I w~...,..JI ":"'::lU.,..p:i rl~H ¥WI ~I ~ cfo rJ,'j a..)1 iJ.o y411 I~ JJI1i:!
~ :- 'I ~I u..c. lWj .~ -'I .• ~. • • J~
w~ ~) .)! .sji..:-JI ~6.1 ..l~YI ¥~ ~I ~~I w~...,..JI ~I~ • ..Jy.-:JI ~ .lL!
':7~I J ~pl w')L.t-li "l.b..i (Approximation Coefficients) ~ ¥WI ~I r.Jj f'~.)
rU.JYI (pseudo Random Sequence) ~~ rl~H i.J~I uc- ~)I wl....,b..JI.)c- ':7jJ:..:
.¥I..,.wI~1
~';.I ~ .~I ~)I w\..j\,!,JI ~I ~Iy..:;.....! .)c- ~ .r.)~ ~u. .J..l ~1..i.. rl~H
rl.J:2.j ~ u.- ':7>-' Clli... ~ ~ J Wjill 1..l,IA ~ ':7~ Clli...S. 4--I~J J (Fingerprint)
.(Sub Key Management) .4.:...fo.JI ~.;ill ~1.i..JI -¥ji
..,.,411 ~ ,,4-~ (Security Analysis) lJl..YI J ~I ~ "I..?oJ f' c.fo.J1 r~ ~t:illl ~J ~
.C.fo.J1 r~1 .,,\.is; J • ..,5.s..lA ~t:illl "\j.'~1 J ~WI
Signal Processing) .Jy.-ll ~I ~I wyL.c. ~I-"" ~ c.fo.JI r~I ~ti:s ~ f' ~
~ ~ lA.J:!C- J ~yll J ~I J Ju~I J ."Wo:i...';.1 ~ J FI ~ J~\.S (Analysis
u....,,~1 ~ 1.:itiJ:.... ~WI ~I I" I • ~. ~ :.11 ~WI ~I 1_, .L..:. • . ~. J. ~ ~. ~ ~.J J J.Jyw • ~ J"""""
'~I .h...·~·'1 ·.~III..)c.L.uiw1.-I··'I-\:.-- . ...iO/'" II' ~U\.c.~th..~~ ' .. 11 ~ J Y""'~..>" • __ yow .-- '-r /0 -r. u.....::u. . •• J.Jyw
• ~I I"·' 0/110 II' ~ ~th.. ~ ~ :.11 u...."YI ~ 1.:itiJ:.... ~WI ~I I .• I ~ .. ...... J /0 -r. u.....::u • . . . J.Jyw • . ~. J. ~ ~.
WI '-l\...Jt.. . - WI .' I· .II..ill:; . ~u...J1 ~ .) A...i~1 Wt..... ~ . L . . .C;~II .0"'" ' .. ~ ~ yow ..r. . t! . .' . .J-~ ~
~I ~ ~~I w~...,..J1 w::lU.,..p:i rl~H ~WI ~I ~ cfo ('1"; a..)1 u.- y411 I~ JJI1i:!
.¥..»ll ~I ~ ~ J rWlI ~ w::lU.,..p:i J w::lU.,..p:i
~6.i ..lLLhl ~~ .~ _'I ~~I..:...6.. .. 11 Uo....I ..1h:il1 J ~I r .:11 •. -II ~. . . ~ • • •• ~ • • .YOW .>!. J J*'.J.,.-.. V' I.Y.C- Y ~-- ~
rt...:ill ~ J:W ~WI r.,llt (Discrete Wavelet Transform) ~.) wL.-l.b..i ~) .)! .sji....J1
0.a ~w..'I1 .)c. ~ I~ .J ~~I ~tbjll /~I (Transform Domain) U"""":! .J ~-rul t~1
. I • I • . .!. -'I . j uw.J1 wb... . ·'1 u~· t..:ill ~ w~ •. "'. ~I ~ .- ~II ~~, ~ U'" .J ~ IS"" • • ~ ~ .J r . •. ~ u..a ~
~·.-II~lwu..· I . -: .. L~I~I •. LlI •• ...F."". • ..)..)~~ '-'~
~I ~ .1:.,· ~ I~u "._11 ~I I..l:.lI 1~1'1 -...ill:; ~ .11' , .... Jl.JII~ J u:u • .~ U'" r , . .,r...F."". r r ,CJlIA ..- J' U'" . • .J •
U;.j. .~ .11 ~I.ti ~6.1 ..lLu'J1 ~I.ti .!. -II - ~w.J1 wb...· .11 w~· ~I . ,:.11 r ~ .J .1oS.,......... • .J. .• ~ IS"" • • .Y'" ~ ~ • .J"""-'
~ o~ U\.c. ~ ~ c:. .-:::. ~I • ~II UJ'1....:W1 ~I wu..· I '. . _II ".- 'I ~I • F.-.J. • Y'" ~ ~ .r' • • ..)..) p U'" ..)~.,r..F."" •
.u....1 ;; . -II ~ • ~ ti. '.': 'I ~I ,~ ~I ~ .t:., ~ ~ .11 . '11 wWlS...1 \iU...1' Yo..)Y""'"" • ~ • ...",..... ~. .~ .J • ...Y-"".J U'" ., ~. ,
~l (Digital Wavelet Transform) 1oSy....J1 ~I.ti .J ~6.i ~~'JI ~I.ti .ft.-11 ~w.J1 u~..,..ll
'i~ .J ~..foll U)I..,,\.a.J1 J\.hj (Approximation Coefficients) ~ J J.J'J I ~..;! W\!\.hj ~)
~'JI w)L..\.a.J1 J\.hj (Horizontal Coefficients) ~ J ~~I J ;;.).,.-\1 rJ:-~ yl ut ... )a..J1 ~
~ J &1)\ Jtbjll t....i ~Iyl ~\.a.J1 J\.hi (Vertical Coefficients) ~ .J ~I Jtbjll .J
.~..;hill U)I..,,\.a.J1 J\.hj (Diagonal Coefficients)
Partial Chaotic) ~-»ll ~I~I ~I rlJ:..j rl~~ (Approximation Coefficients) ~ M!
(Logistic Maps) ~I ~6.i :41i ".'1') .hJ1-.?-~) rl~l ~ ~ 'i~1 .J (Image encryption
(Sub Key Management) ~ yLJl ~..;ill ~1.iJ1 ¥ ji f'1J:..j 0-0 D¥ ji ~ ~\..,;.. loS Y'" C l:ii.. ~ JSl
l>-'fl (Orbit Hopping) ~)11 .hJ1-.?- &.)';1 ri! ~ jii.l1 ~ ~ ~j.,..u ¥ji ~.ft.! ..cll:l J
'i~1 J ~..foll u::L\.a.J1 J\.hj (Approximation Coefficients) ~ ~p'.,..ll r=il1 ~ ~ ~jyU
·1....';1 ~ .. 11 ~ I I· .~.II ~I I..l:.lI 't:ij]1 ~ .. -:'~I UotS 0 .. 11 ~ • ~ U .J • ..Y-"". ~ ..», ~ CY--. r ~ ..J r-:- . .)Y""'"". ~ • .
:~ I.... ~ ~ (Security Analysis)
:~ I.... r'~~ ~.J (Statistical Analysis) .,;t...-:a. 'II J.!b.:ill -,
~I 0.).,.-\1 J ~';I o.),.,...,JI ~fi.JI.bWlI ri! ~t...-:a.J (Histogram Analysis) -,
.J ~'JI 0.)".....,Jl ~fi.JI.b~ yfojll ~ 0"45 (Correlation Coefficients) -Y
.~I 0.).,.-\1
Key Sensitivity Test) Cl:ii..11 ,..;. .} .J:!:!-Llll ~4 c.fo.Jl ~ j)"p-!I f'1..l:.lI1 ~L...:... Jli.. -Y
.b.....~ .11 .. !.~II ~ us (NPCR) 0 .. 11 A..;.< .11 .bWlI.ui .• ~ us IjS (Anal . .J-' ~ 0". J .)~ J-" ... ~ 0" • .J YSIS
.0 ..).,.-\1 o~t....;:.:;....J ~ ..;:a:il
U;.jJ1 I~I' 't:ij]1 A..; \i... .~ .11 ~I IJ:..j o.i ..lA t...-:a.1'1 ~ ~tS WiUI .l! r f' ' I.E-! ~ ..)~.J CY""". r .T loS ~ ,. • J
· .cl1:l~\:; ~.IL.II~Iu..c. . ..i· U;.jJlo~t.iSu1i1 .~.~.II '\.till U;.jJ1 .,..-: .. IIIoS~6.'i1 U'" J .~. • 'or U:!'" . .J""""""",.r r .J .... y-
r1..l;.j}1 ~ t....11oS.,:;.....J\IoS~6.'J1 r1..l;.j}1 ~.b:ii 0.).,.-\1 &.) ~ M! ~ 0:!-01..l:.ll1 ~ FI ~ y.)~
w.i "'11 ~ ~ ~ -~;-II w~1 1.liU..1 ~ -'IL:.. _L'C~II . .-i ~\A t _L~ 11-'1 U ~ YJ. - •• J-'W • f' • J • Y •. yy-o-w -r J>""" '-F- ~ ~
Jt.J1 0--~I ~yl wt...)-ll JJI,lj J Jij~.,....J t~ J .~~I wt...)-ll JJI,lj J Jij ~ LolA t..;~
t...16.·· ~I ~ • t...... ~. . ~.L. r._.' • il~1 u..-~I wliL..J.\ t..w illJ:... .. ,-f' ~. ~ • Y"'~ .~"""..J'" .J. •. . ~u--
J .~I ~ ~I..i.. ~ J.".-.,ll ~Jh.J1 (j";.J~1 0-0 WIS. ~ .ulit+.J1 o~ ~ ~Ijll wl~~.l)'1
wt...)-ll J:;..1.l ~WI ~I ~~ ~ J ~I 0.» ~ ~.fo.JI J).JI -.>.l:o.' ~I ~I u;1S.
wi ~ .illlI J ~~I .cllWI(.Fo wl...)-~ ~I w\....L)WI .illi .~p. ~ .;~ "i ~ ~~I
.~ ~I J ~ ~w.ill ~ ~I u'iJh.JI ~fo.)c- iyu wfo
0-- tiel J ~ ~~ ~I w'JL-J')'1 u~ .)c- ¥WI wt....:lW1 wl~ ..;.,.-}I ~ JJI,lj ~I
~ .:I~ ~Jh.. J ~I ~I~I 0-- ~Iy J tt-lfl ~ ~I J ~4JI J ~~I Aj";.,,!11 u'i4--JI
J:ll:.. 0-- .~WI u~1 ul~ ..;.,.-\1 JJI,lj ~~i wL.'1I.J ~I Jii ... ; ~ f""t.....:i ~I .J ~.fo.JI J).:...ll
ul...:W1 ul~ ..;.,.-\1 J ..;.,.-ll JJI,lj ~ wI... ~I J ~I JJ;'" jl w411 ~ ~L.... yl ~ Jfo:ij ..;~I I~
. ':'1 •• LII .' . to,. ~I ·I...~I wt..l.l:.l..u ~\i."il 1- - _It ~ ·'1 . '11 .' • .lAi.u ~WI J ~ J c:r- ..,.,.... u- U .•. • or-.JJ'""""*' • .J- J i.JA ~ •••
• .~WI u~1 wlW:i -:' .. L" J:ll:..' .• :11 •• Ltl·· ~ •••• J I,lj}1 ~ ~ .. '1 ~ J • • ~ U'" ~ .J c:r- ..,.,..... J ~ ~..J •• J U"""
~I A..W:i -:' .. L~ ~. J I,lj}1 Wu -~- -'I ~ . ~I ;,i'ij ••• • • • ~ i.JA J .J ~ .Y'" i.JA • J~
~ (j;;':"':' J ~ 4->,," '\ ~ J E-"Iyoll ~.J yly'l ~ 0-- wfo J W-WT' ~ ~yl ill wl..;t...-:i:..)'1 J jY'P. ....... ~ J ~L....yl(.Fo -»Y'.)' ~w.)'4 ~jj 'j~ VT' .J ~~ L.....; '\ t
.~.JI ~fi..J1 yly.'11 v<:olyLi.a' ~~ J L ,;; .. II
u... .11' . ·.:.'1 .' II Aj~'iU ~I ~ . __ I tw:. ., -~ ~ -'I' .....LlII~ J .. J J' i.JA V"" J"-' ~ Y 'T' .' . L""-..r' JC-~ J' i.JA • • ~
A..W:i l.liU..u - -'I J l,lj Jj.j' \..jJ ~I -\:'~II ~I . I '·1 u... "1' <...LJI I~ J Ui.. • f' .. ..;~ J J ~ C---. ->" J V"" ~. J' i.JA • • J •
J l,lj ~I ·I...~I ~·'I .' • ~ h.J 1. ·1.liU..I • -:11 ~I ~I ~I ~ u.JI ~I J J ~ u J • .J- ~ J _ .,..~. .J •
• . L~ ·.C .• w .I1~WI ~I ~~~I •. LlI '1 • I· - -II Jij ~ '-'...>- • u-= J • J' • ~- •• '-'J"'"' V"" yu.... ,.. .J . ..;~
:WF~.)' ~I w~1
~jl:. CF- ~WI ~I t.Jj ...,.lc. .lAia: J ~ts.JI ~I / ~I (Spatial Domain) ~ .J J.J'11 t~1
";\<-11/ - I ·;'1 :·-'I . .-i -'" i - -'I· l.4i...1 ~ ., .or--- or-~ J:"'"" -r <r"' J .J~ ~ • ~
~,,~, , 4.w4' ~
~~~1" , ~~,~, ~
~\.1;.j ~ O~jQ .JJla\\ ~y\ ~W\ ~)l,J\ ~~
~~..,il\ ~~\ w~yil\
~1~j~i~l~i
~).) ~.:.,,~ J~), ~~, ~" ~j1~" I",u,u ~~, ~.)lf"w 4.G~ 4Jl-)
~LoJ'
~
.:.,,')'~-y, , ':"'~,jOO'Y' 4,..,.,w,
,-,f Iof ~ ..
.;i.! J:l.J ~ I.;foJJ\ ju .•. ii\ w\...)a.JI .J w1..,l....W\ ~ ~
-,?H\ Jijll.J ~)fo:ill.J~).Jl ~yr.ll ~\S\lI o .JA\.il\ t..)
" • , , o.JA\.il\
DIS
005.82 ZE-DI
77459 C2
DIGITAL IMAGE WATERMARKING PROTECTION BASED ON CHAOTIC BIOMETRIC SYSTEM
\\\\\~\"\\\"~'\\\I \\11' I'll \ll\ 77459